Search results for "Privacy"
showing 10 items of 402 documents
Fuzzy Logic Based Security Trust Evaluation for IoT Environments
2019
In the new technological era called the Internet of Things (IoT), people, machines and objects communicate with each other via the Internet by exchanging information. In this context, trust plays an important role and is considered as a key factor in the success of the IoT services expansion. IoT services and applications use in some cases data concerning the privacy of their users. Consequently, users should trust the entities exchanging their personal information. In this paper, we present a framework that evaluates the security trust level of IoT nodes based on a Fuzzy Logic model using different input parameters such as Device Physical Security, Device Security Level and Device Ownershi…
Experimental evaluation of privacy-preserving aggregation schemes on planetlab
2015
New pervasive technologies often reveal many sen- sitive information about users’ habits, seriously compromising the privacy and sometimes even the personal security of people. To cope with this problem, researchers have developed the idea of privacy-preserving data mining which refers to the possibility of releasing aggregate information about the data provided by multiple users, without any information leakage about individual data. These techniques have different privacy levels and communication costs, but all of them can suffer when some users’ data becomes inaccessible during the operation of the privacy preserving protocols. It is thus interesting to validate the applicability of such…
Information flow and WOM in social media and online communities
2017
Small worlds with a difference
2011
Political discussions on social network platforms represent an increasingly relevant source of political information, an opportunity for the exchange of opinions and a popular source of quotes for media outlets. We analyzed political communication on Twitter during the run-up to the German general election of 2009 by extracting a directed network of user interactions based on the exchange of political information and opinions. In consonance with expectations from previous research, the resulting network exhibits small-world properties, lending itself to fast and efficient information diffusion. We go on to demonstrate that precisely the highly connected nodes, characteristic for small-world…
A Context-Aware Mobile Solution for Assisting Tourists in a Smart Environment
2017
Security Enhancement of Peer-to-Peer Session Initiation
2012
Today, Peer-to-Peer SIP based communication systems have attracted much attention from both the academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, the decentralization features come to the cost of the reduced manageability and create new concerns. Until now, the main focus of research was on the availability of the network and systems, while few attempts are put on protecting privacy. In this chapter, we investigate on P2PSIP security issues and introduce two enhancement solutions: central based security and distributed trust security, both of which have their own advanta…
Low-cost active cyber defence
2014
The authors of this paper investigated relatively simple active strategies against selected popular cyber threat vectors. When cyber attacks are analysed for their severity and occurrence, many incidents are usually classifi ed as minor, e.g. spam or phishing. We are interested in the various types of low-end cyber incidents (as opposed to high-end state- sponsored incidents and advanced persistent threats) for two reasons: • being the least complicated incidents, we expect to fi nd simple active response The authors analysed the proposed strategies from the security economics point of view to determine why and how these strategies might be effective. We also discuss the legal aspects of th…
Performing transnational family with the affordances of mobile apps : a case study of Polish mothers living in Finland
2020
Affordances provided by digital technologies and mobile apps (WhatsApp, Skype, Messenger) help in maintaining familyhood. These mobile apps enable the creation of in-app family groups. They also afford image sharing, which is used for phatic purposes. Digital connectivity provides the illusions of togetherness and belonging, and allows for performing family in a transnational context (emotional transnationalism). However, it also generates the feelings of guilt through infrequent communication. In the auto-driven visual elicitation interviews, the study looks at family constellations and technologically mediated communication from the perspective of five Polish mothers living in Finland. Ap…
Preventing problematic internet use during the COVID-19 pandemic: Consensus guidance
2020
As a response to the COVID-19 pandemic, many governments have introduced steps such as spatial distancing and “staying at home” to curb its spread and impact. The fear resulting from the disease, the ‘lockdown’ situation, high levels of uncertainty regarding the future, and financial insecurity raise the level of stress, anxiety, and depression experienced by people all around the world. Psychoactive substances and other reinforcing behaviors (e.g., gambling, video gaming, watching pornography) are often used to reduce stress and anxiety and/or to alleviate depressed mood. The tendency to use such substances and engage in such behaviors in an excessive manner as putative coping strategies i…
Il consenso informato per l'effettuazione del test per la diagnosi di infezione da HIV: Come comportarsi in caso di minori
2008
AIDS is a clinical picture related to Human Immunodeficiency Virus (HIV) infection. In the last 20 years this infection has spread progressively, with approximately 2.4 million children under 15 years old now infected. The HIV antibody test is generally used to reveal the infection. In most European countries the test is voluntary; in Italy, implementation of the test is now regulated by Law 135/90. Art. 5 of the law states that the test is voluntary while informed consent is obligatory. However, nothing is stated concerning the child's consent. By contrast, other Italian laws (e.g., Law 194/78, Law 194/96 and DPR 309/90) establish that the physician should only accept the wishes of minors …